A | B | C | |
---|---|---|---|
1 | Vulnhub VM LIST: | Disclaimer: The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or brush up on any weak points that you may have in your pentesting methodology. This list is not a substitute to the actual lab environment that is in the PWK/OSCP course. When you are taking the course, It is encouraged that you try to go through every system that is in the PWK/OSCP lab environment, as they will provide better insight for when you attempt to the exam itself. This list is not exhaustive, nor does it guarantee a passing grade for the OSCP Exam. | DO NOT REQUEST EDIT ACCESS. Save a copy instead. Do not forget to check the other tabs in this list below!: |
2 | Curated by the NetSec Focus Admins - netsecfocus.com | ||
3 | Join us on the #"VulnHub & CTF" channel on Mattermost and find people to complete these with! | ||
4 | List of PWK/OSCP boxes from the previous versions of the course | Current Systems that are Simliar to the current PWK/OSCP course | Other Vm's to check out! |
5 | Kioptrix: Level 1 (#1): https://www.vulnhub.com/entry/kioptrix-level-1-1,22/ | DC 9: https://www.vulnhub.com/entry/dc-9,412/ | IMF: https://www.vulnhub.com/entry/imf-1,162/ |
6 | Kioptrix: Level 1.1 (#2): https://www.vulnhub.com/entry/kioptrix-level-11-2,23/ | Digitalworld.local (Bravery): https://www.vulnhub.com/entry/digitalworldlocal-bravery,281/ | Tommy Boy: https://www.vulnhub.com/entry/tommy-boy-1,157/ |
7 | Kioptrix: Level 1.2 (#3): https://www.vulnhub.com/entry/kioptrix-level-12-3,24/ | Digitalworld.local (Development): https://www.vulnhub.com/entry/digitalworldlocal-development,280/ | Billy Madison: https://www.vulnhub.com/entry/billy-madison-11,161/ |
8 | Kioptrix: Level 1.3 (#4): https://www.vulnhub.com/entry/kioptrix-level-13-4,25 | Digitalworld.local (Mercy v2): https://www.vulnhub.com/entry/digitalworldlocal-mercy-v2,263/ | Tr0ll1: https://www.vulnhub.com/entry/tr0ll-1,100/ |
9 | Kioptrix: 2014: https://www.vulnhub.com/entry/kioptrix-2014-5,62/ | Digitalworld.local (JOY): https://www.vulnhub.com/entry/digitalworldlocal-joy,298/ | Tr0ll2: https://www.vulnhub.com/entry/tr0ll-2,107/ |
10 | FristiLeaks 1.3: https://www.vulnhub.com/entry/fristileaks-13,133/ | Digitalword.local (FALL): https://www.vulnhub.com/entry/digitalworldlocal-fall,726/ | Wallaby's Nightmare: https://www.vulnhub.com/entry/wallabys-nightmare-v102,176/ |
11 | Stapler 1: https://www.vulnhub.com/entry/stapler-1,150/ | Prime 1: https://www.vulnhub.com/entry/prime-1,358/ | Moria: https://www.vulnhub.com/entry/moria-1,187/ |
12 | VulnOS 2: https://www.vulnhub.com/entry/vulnos-2,147/ | Misdirection 1: https://www.vulnhub.com/entry/misdirection-1,371/ | BSides Vancouver 2018: https://www.vulnhub.com/entry/bsides-vancouver-2018-workshop,231/ |
13 | SickOs 1.2: https://www.vulnhub.com/entry/sickos-12,144/ | Sar 1: https://www.vulnhub.com/entry/sar-1,425/ | DEFCON Toronto Galahad: https://www.vulnhub.com/entry/defcon-toronto-galahad,194/ |
14 | HackLAB: Vulnix: https://www.vulnhub.com/entry/hacklab-vulnix,48/ | Djinn 1: https://www.vulnhub.com/entry/djinn-1,397/ | Spydersec: https://www.vulnhub.com/entry/spydersec-challenge,128/ |
15 | /dev/random: scream: https://www.vulnhub.com/entry/devrandom-scream,47/ | EVM 1: https://www.vulnhub.com/entry/evm-1,391/ | Pinkys Palace v3: https://www.vulnhub.com/entry/pinkys-palace-v3,237/ |
16 | pWnOS 2.0: https://www.vulnhub.com/entry/pwnos-20-pre-release,34/ | DerpNStink 1: https://www.vulnhub.com/entry/derpnstink-1,221/ | Pinkys Palace v4: https://www.vulnhub.com/entry/pinkys-palace-v4,265/ |
17 | SkyTower 1: https://www.vulnhub.com/entry/skytower-1,96/ | RickdiculouslyEasy 1: https://www.vulnhub.com/entry/rickdiculouslyeasy-1,207/ | Vulnerable Docker 1: https://www.vulnhub.com/entry/vulnerable-docker-1,208/ |
18 | Mr-Robot 1: https://www.vulnhub.com/entry/mr-robot-1,151/ | Tommy Boy 1: https://www.vulnhub.com/entry/tommy-boy-1,157/ | Node 1: https://www.vulnhub.com/entry/node-1,252/ |
19 | PwnLab: https://www.vulnhub.com/entry/pwnlab-init,158/ | Breach 1: https://www.vulnhub.com/entry/breach-1,152/ | Troll 3: https://www.vulnhub.com/entry/tr0ll-3,340/ |
20 | Lin.Security: https://www.vulnhub.com/entry/linsecurity-1,244/ | Breach 2.1: https://www.vulnhub.com/entry/breach-21,159/ | Readme 1: https://www.vulnhub.com/entry/readme-1,336/ |
21 | Temple of Doom: https://www.vulnhub.com/entry/temple-of-doom-1,243/ | Breach 3.0.1: https://www.vulnhub.com/entry/breach-301,177/ | OZ: https://www.vulnhub.com/entry/oz-1,317/ |
22 | Pinkys Palace v2: https://www.vulnhub.com/entry/pinkys-palace-v2,229/ | NullByte: https://www.vulnhub.com/entry/nullbyte-1,126/ | Metasploitable 3: https://github.com/rapid7/metasploitable3 |
23 | Zico2: https://www.vulnhub.com/entry/zico2-1,210/ | Bob 1.0.1: https://www.vulnhub.com/entry/bob-101,226/ | Election 1: https://www.vulnhub.com/entry/election-1,503/ |
24 | Wintermute: https://www.vulnhub.com/entry/wintermute-1,239/ | Toppo 1: https://www.vulnhub.com/entry/toppo-1,245/ | Pinkys Palace v1: https://www.vulnhub.com/entry/pinkys-palace-v1,225/ |
25 | Tr0ll 1: https://www.vulnhub.com/entry/tr0ll-1,100/ | W34kn3ss 1: https://www.vulnhub.com/entry/w34kn3ss-1,270/ | Hacker Kid: 1.0.1: https://www.vulnhub.com/entry/hacker-kid-101,719/ |
26 | Tr0ll 2: https://www.vulnhub.com/entry/tr0ll-2,107/ | GoldenEye 1: https://www.vulnhub.com/entry/goldeneye-1,240/ | |
27 | Web Developer 1: https://www.vulnhub.com/entry/web-developer-1,288/ | Infosec Prep OSCP Box: https://www.vulnhub.com/entry/infosec-prep-oscp,508/ | |
28 | SolidState: https://www.vulnhub.com/entry/solidstate-1,261/ | LemonSqueezy: https://www.vulnhub.com/entry/lemonsqueezy-1,473/ | |
29 | Hackme 1: https://www.vulnhub.com/entry/hackme-1,330/ | Brainpan 1: https://www.vulnhub.com/entry/brainpan-1,51/ | |
30 | Escalate_Linux: 1: https://www.vulnhub.com/entry/escalate_linux-1,323/ | Lord of the root 1.0.1: https://www.vulnhub.com/entry/lord-of-the-root-101,129/ | |
31 | DC 6: https://www.vulnhub.com/entry/dc-6,315/ | Tiki-1: https://www.vulnhub.com/entry/tiki-1,525/ | |
32 | Healthcare 1: https://www.vulnhub.com/entry/healthcare-1,522/ | ||
33 | Photographer 1: https://www.vulnhub.com/entry/photographer-1,519/ | ||
34 | Glasglow 1.1: https://www.vulnhub.com/entry/glasgow-smile-11,491/ | ||
35 | DevGuru 1: https://www.vulnhub.com/entry/devguru-1,620/ | ||
36 | Alpha 1: https://www.vulnhub.com/entry/alfa-1,655/ | ||
37 | Hack Me Please: https://www.vulnhub.com/entry/hack-me-please-1,731/ | ||
38 | |||
39 | |||
40 | |||
41 | |||
42 | |||
43 | |||
44 | |||
45 | |||
46 | |||
47 | |||
48 | |||
49 | |||
50 | |||
51 | |||
52 | |||
53 | |||
54 | |||
55 | |||
56 | |||
57 | |||
58 | |||
59 |
A | B | C | |
---|---|---|---|
1 | Proving Grounds Play VM LIST: | Disclaimer: The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or brush up on any weak points that you may have in your pentesting methodology. This list is not a substitute to the actual lab environment that is in the PWK/OSCP course. When you are taking the course, It is encouraged that you try to go through every system that is in the PWK/OSCP lab environment, as they will provide better insight for when you attempt to the exam itself. This list is not exhaustive, nor does it guarantee a passing grade for the OSCP Exam. | Do not forget to check the other tabs in this list below!: |
2 | Curated by TJ Null at netsecfocus.com | ||
3 | Join us on the #"VulnHub & CTF" channel on Mattermost and find people to complete these with! | IIf you do not see the box currently listed in PG you can play with it in the retired section on PG Practice or Download them from Vulnhub! | |
4 | |||
5 | Linux: | Harder Boxes to try out... | |
6 | Born2Root | Djinn3 | |
7 | SoSimple | GLASGOW SMILE: 1.1 | |
8 | Stapler | PowerGrid 1.0.1 | |
9 | HA: Wordy | GITROOT: 1 | |
10 | SO SIMPLE: 1 | Dawn2 | |
11 | TRE: 1 (Although Idk If I would do the priv esc in a real world scenario ¯\_(ツ)_/¯ ) | ||
12 | SUNSET: MIDNIGHT | ||
13 | InfosecPrep | ||
14 | Seppuku | ||
15 | |||
16 | |||
17 | |||
18 | |||
19 | |||
20 | |||
21 |
A | B | C | |
---|---|---|---|
1 | Proving Grounds Practice VM LIST: | Disclaimer: The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or brush up on any weak points that you may have in your pentesting methodology. This list is not a substitute to the actual lab environment that is in the PWK/OSCP course. When you are taking the course, It is encouraged that you try to go through every system that is in the PWK/OSCP lab environment, as they will provide better insight for when you attempt to the exam itself. This list is not exhaustive, nor does it guarantee a passing grade for the OSCP Exam. | Do not forget to check the other tabs in this list below!: |
2 | Curated by TJ Null at netsecfocus.com | ||
3 | Join us on the #"VulnHub & CTF" channel on Mattermost and find people to complete these with! | ||
4 | |||
5 | Windows: | Linux: | Harder Boxes to try out... |
6 | Nickel | ClamAV | Bratarina |
7 | Slort | Wombo | Internal |
8 | Authby | Payday | Clyde |
9 | Jacko | Fail | Vector |
10 | MeatHead | Nibbles | Shifty |
11 | UT99 | Banzai | XposedAPI |
12 | MedJed | Hunit | HelpDesk |
13 | Algeron | Dibble | Twiggy |
14 | Billyboss | Zino | Pebbles |
15 | Kevin | Hetemit | Panic |
16 | Metallus | Peppo | CookieCutter |
17 | Hutch | Postfish (Requires some Phishing) | Tico |
18 | Heist | Malbec | |
19 | Vault (Requires some MITM) | Sybaris | |
20 | Shenzi | Hawat | |
21 | DVR4 | ZenPhoto | |
22 | Craft | Readys | |
23 | Hepet | Nukem | |
24 | Squid | Sorcerer | |
25 | Walla | ||
26 | Pelican | ||
27 | Snookums | ||
28 | Exfiltrated | ||
29 | Exfiltrated | ||
30 | |||
31 | |||
32 | |||
33 | |||
34 | |||
35 | |||
36 | |||
37 | |||
38 | |||
39 | |||
40 | |||
41 | |||
42 | |||
43 | |||
44 |
A | B | C | D | E | F | |
---|---|---|---|---|---|---|
1 | HACKTHEBOX VM LIST: | Do not forget to check the other tabs in this list below!: | ||||
2 | Curated by: TJnull at Netsec Focus | |||||
3 | Disclaimer: The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or brush up on any weak points that you may have in your pentesting methodology. This list is not a substitute to the actual lab environment that is in the PWK/OSCP course. When you are taking the course, It is encouraged that you try to go through every system that is in the PWK/OSCP lab environment, as they will provide better insight for when you attempt to the exam itself. This list is not exhaustive, nor does it guarantee a passing grade for the OSCP Exam. | |||||
4 | Linux Boxes: | Windows Boxes: | More challenging than OSCP, but good practice: | Updated Boxes for December 2021: | ||
5 | Lame | legacy | Jeeves [Windows] | Object [Windows] | ||
6 | brainfuck | Blue | Bart [Windows] | Writer [Linux] | ||
7 | shocker | Devel | Tally [Windows] | Precise [Linux] | ||
8 | bashed | Optimum | Kotarak [Linux] | |||
9 | nibbles | Bastard | falafel [Linux] | |||
10 | beep | granny | Devops [Linux] | |||
11 | cronos | Arctic | Hawk [Linux] | |||
12 | nineveh | grandpa | Netmon [Windows] | |||
13 | sense | silo | Lightweight [Linux] | |||
14 | solidstate | bounty | La Casa De Papel [Linux] | |||
15 | node | jerry | Jail [Linux] | |||
16 | valentine | conceal | Safe [Linux] | |||
17 | poison | chatterbox | Bitlab [Linux] | |||
18 | sunday | Forest | Sizzle [Windows] | |||
19 | tartarsauce | BankRobber | Sniper [Windows] | |||
20 | Irked | secnotes | Control [Windows] | |||
21 | Friendzone | Bastion | October [Linux] | |||
22 | Swagshop | Buff | Mango [Linux] | |||
23 | Networked | Servmon | Nest [Windows] | |||
24 | jarvis | Active | Book [Linux] | |||
25 | Mirai | Remote | Sauna [Windows] | |||
26 | Popcorn | Fuse | Cascade [Windows] | |||
27 | Haircut | Omni | Querier [Windows] | |||
28 | Blocky | Worker | Quick [Linux] | |||
29 | Frolic | Love | BlackField [Windows] | |||
30 | Postman | Intelligence | APT [Windows] | |||
31 | Mango | APT | Atom [Windows] | |||
32 | Traverxec | Object | BreadCrumbs [Windows] | |||
33 | OpenAdmin | Monitors [Linux] | ||||
34 | Magic | Dynstr [Linux] | ||||
35 | Admirer | PivotAPI [Windows] | ||||
36 | Blunder | Pikaboo [Linux] | ||||
37 | Tabby | Monteverde [Windows] | ||||
38 | Doctor | Writer [Linux] | ||||
39 | SneakyMailer | Forge [Linux] | ||||
40 | Passage | Stacked [Linux] | ||||
41 | Luanne | |||||
42 | Time | |||||
43 | Ready | |||||
44 | Delivery | |||||
45 | Ophiuchi | |||||
46 | ScriptKiddie | |||||
47 | Armageddon | |||||
48 | Knife | |||||
49 | Pit | |||||
50 | Seal | |||||
51 | Previse | |||||
52 | Forge | |||||
53 | Horizontall | |||||
54 | Shibboleth | |||||
55 | ||||||
56 | ||||||
57 | ||||||
58 | ||||||
59 | ||||||
60 | ||||||
61 | ||||||
62 | ||||||
63 |
A | |
---|---|
1 |
A | B | C | D | E | F | |
---|---|---|---|---|---|---|
1 | Vulnhub/Hackthebox OSWE-like VMs | Click the tab below for VulnHub/HacktheBox vm's for OSCP | ||||
2 | Curated by: TJnull at Netsec Focus | |||||
3 | Hackthebox | |||||
4 | Linux Boxes: | Windows Boxes: | More challenging than OSWE, but good practice: | |||
5 | Vault | JSON | Arkham | |||
6 | popcorn | Hackback | ||||
7 | Celestial | Holiday | ||||
8 | Blocky (Good to practice with JD-GUI) | |||||
9 | Falafel | |||||
10 | Zipper | |||||
11 | Unattended | |||||
12 | Help | |||||
13 | Mango [Focus on creating your own Boolean Script] | |||||
14 | Schooled | |||||
15 | Sink | |||||
16 | Monitors | |||||
17 | ||||||
18 | ||||||
19 | ||||||
20 | ||||||
21 | ||||||
22 | ||||||
23 | ||||||
24 | ||||||
25 | ||||||
26 | ||||||
27 | ||||||
28 | ||||||
29 | ||||||
30 | Vulnhub | |||||
31 | Silky-CTF: 0x02: https://www.vulnhub.com/entry/silky-ctf-0x02,307/ | Flick 2: https://www.vulnhub.com/entry/flick-2,122/ | ||||
32 | bwapp: https://www.vulnhub.com/series/bwapp,34/ | |||||
33 | Homeless 1: https://www.vulnhub.com/entry/homeless-1,215/ | |||||
34 | Seattle 0.3 https://www.vulnhub.com/entry/seattle-v03,145/ | |||||
35 | Ted 1: https://www.vulnhub.com/entry/ted-1,327/ | |||||
36 | Raven 2: https://www.vulnhub.com/entry/raven-2,269/ | |||||
37 | Potato: https://www.vulnhub.com/entry/potato-1,529/ | |||||
38 | Secure Code 1: https://www.vulnhub.com/entry/securecode-1,651/ | |||||
39 | ||||||
40 | ||||||
41 | ||||||
42 | ||||||
43 |